mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-29 07:35:32 +01:00
106 lines
No EOL
3.8 KiB
JSON
106 lines
No EOL
3.8 KiB
JSON
[
|
|
{
|
|
"id": 976180143,
|
|
"name": "Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce",
|
|
"full_name": "Caztemaz\/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce",
|
|
"owner": {
|
|
"login": "Caztemaz",
|
|
"id": 209937297,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/209937297?v=4",
|
|
"html_url": "https:\/\/github.com\/Caztemaz",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Caztemaz\/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce",
|
|
"description": "Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.",
|
|
"fork": false,
|
|
"created_at": "2025-05-01T16:35:56Z",
|
|
"updated_at": "2025-08-30T18:27:18Z",
|
|
"pushed_at": "2025-08-30T18:27:14Z",
|
|
"stargazers_count": 12,
|
|
"watchers_count": 12,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve",
|
|
"cve-2025-44228",
|
|
"cve-scanning",
|
|
"exploit",
|
|
"exploit-code",
|
|
"exploit-database",
|
|
"exploit-development",
|
|
"exploit-exercises",
|
|
"exploit-kit",
|
|
"exploitation",
|
|
"exploitation-framework",
|
|
"lnk",
|
|
"lnk-builder",
|
|
"lnk-cve",
|
|
"lnk-exploit",
|
|
"lnk-payloads",
|
|
"lnk-rce",
|
|
"lnk-shortcut",
|
|
"lnk-stomping",
|
|
"slient-exploit-builder"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 12,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 976180146,
|
|
"name": "Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud",
|
|
"full_name": "Caztemaz\/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud",
|
|
"owner": {
|
|
"login": "Caztemaz",
|
|
"id": 209937297,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/209937297?v=4",
|
|
"html_url": "https:\/\/github.com\/Caztemaz",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Caztemaz\/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud",
|
|
"description": "Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.",
|
|
"fork": false,
|
|
"created_at": "2025-05-01T16:35:56Z",
|
|
"updated_at": "2025-08-30T18:25:09Z",
|
|
"pushed_at": "2025-08-30T18:25:05Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve",
|
|
"cve-2025-44228",
|
|
"cve-scanning",
|
|
"doc",
|
|
"doc-builder",
|
|
"doc-cve",
|
|
"doc-exploit",
|
|
"doc-malware",
|
|
"doc-payloads",
|
|
"exploit",
|
|
"exploit-code",
|
|
"exploit-database",
|
|
"exploit-development",
|
|
"exploit-exercises",
|
|
"exploit-kit",
|
|
"exploitation",
|
|
"exploitation-framework",
|
|
"office",
|
|
"office-365",
|
|
"slient-exploit-builder"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |